|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-22348-8 |
003 |
DE-He213 |
005 |
20220115064538.0 |
007 |
cr nn 008mamaa |
008 |
110628s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642223488
|9 978-3-642-22348-8
|
024 |
7 |
|
|a 10.1007/978-3-642-22348-8
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Data and Applications Security and Privacy XXV
|h [electronic resource] :
|b 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings /
|c edited by Yingjiu Li.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XI, 309 p. 90 illus., 32 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 6818
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Data and Information Security.
|
700 |
1 |
|
|a Li, Yingjiu.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642223471
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642223495
|
830 |
|
0 |
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 6818
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-22348-8
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|